Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
false alarm rate
biblio
Test Method for Automatic Detection Capability of Civil Aviation Security Equipment Using Bayesian Estimation
Submitted by aekwall on Tue, 04/27/2021 - 12:10pm
Safety
false alarm rate
security
Bayes methods
cyber-physical systems
Resiliency
pubcrawl
detection rate
information technology
Markov processes
estimation
Monte Carlo methods
belief networks
Bayesian estimation
civil aviation security equipment
prohibited items
biblio
Utilizing Netflow Data to Detect Slow Read Attacks
Submitted by aekwall on Mon, 11/09/2020 - 12:14pm
machine learners
application layer DDoS attacks
application servers
classifiers
IP Flow Information Export standard
IPFIX
IPFIX standard
legitimate network requests
low volume attack methods
open systems
NetFlow
Netflow data
network security solutions
SiLK
Slow Read
slow read attack detection models
slow read DDoS attacks
Information Reuse and Security
pubcrawl
Computer crime
computer network security
false alarm rate
IP networks
Protocols
invasive software
learning (artificial intelligence)
Resiliency
distributed denial of service
internet
tools
computer networks
file servers
Web servers
Compositionality
malware
memory resources
biblio
Wormhole attack detection in ad hoc network using machine learning technique
Submitted by aekwall on Mon, 08/03/2020 - 9:19am
machine learning algorithms
wormhole attack detection
wormhole attack
Training
telecommunication security
Task Analysis
stochastic gradient descent
security
Resiliency
Peer-to-peer computing
Naive Bayes
multiple wormhole tunnels
Metrics
machine learning technique
pubcrawl
machine learning
learning (artificial intelligence)
final task
Feature Selection
false alarm rate
detection rate
data generation
data collection operation
Compositionality
Ad hoc networks
Ad Hoc Network Security
ad hoc network environment
ad hoc network
biblio
Research on Trust Degree Model of Fault Alarms Based on Neural Network
Submitted by grigby1 on Mon, 08/05/2019 - 10:35am
reliance
human trust
neural nets
neural network
Neurons
operator factors
policy-based governance
pubcrawl
Reliability
human machine system
resilience
Resiliency
Scalability
security of data
situational factors
Training
trust degree model
Databases
alarm system
Alarm systems
available experimental studies
Biological neural networks
collaboration
Compliance
computerised instrumentation
data base
alarm errors
Decision Making
false alarm rate
false trust
fault alarms
fault diagnosis
Human behavior
Human Factors
biblio
Low False Alarm Ratio DDoS Detection for ms-scale Threat Mitigation
Submitted by aekwall on Wed, 02/13/2019 - 10:56am
network security
intrusion detection and prevention
intrusion detection system
low false alarm ratio DDoS detection
low reaction time detection system
massive IoT botnets
metric
mitigation system
Monitoring
ms-scale threat mitigation
Inspection
next-generation security solutions
pubcrawl
reaction times
Resiliency
threat mitigation
threat type
volatile DDoS threats
volatile ephemeral DDoS attacks
false alarm rate
attackers
automated response
botnet
Computer crime
computer network security
data center networks
DDoS
Detectors
advanced security solutions
false detection
field programmable gate arrays
FPGA
high-intensity short-duration volatile ephemeral attack waves
Human behavior
human out-of-loop
human-in-the-loop security center paradigm
IDS
biblio
DDoS attack detection approach using an efficient cluster analysis in large data scale
Submitted by grigby1 on Tue, 01/16/2018 - 5:25pm
network security
genuine network flow identification
host-based resources
Human behavior
Intrusion Detection
intrusion detection system
large data scale
legitimate users
Metrics
network resources
flooding attack packets
packets windowing
pattern clustering
Phi coefficient
pubcrawl
Resiliency
resource allocation
Shape
unsupervised data mining
wireless sensor networks
CURE
CAIDA2008 datasets
cluster analysis
clustering
Clustering algorithms
clustering using representative
composability
Computer crime
computer network security
congestion-based attack
CAIDA2007 datasets
DARPA2000 datasets
Data mining
DDoS attack detection
detection rate
Distributed Denial of Service (DDoS)
distributed denial of service attack
Entropy
F measure
false alarm rate
biblio
Dr. WATTson: Lightweight current-based Intrusion Detection (CBID)
Submitted by grigby1 on Mon, 11/20/2017 - 11:28am
internet
Voltage measurement
Voltage Characteristics
Tamper-Resistance
Tamper resistance
SCADA systems
SCADA
Resiliency
resilience
pubcrawl
Power measurement
lightweight current-based intrusion detection
lightweight current-based IDS
knowledge-based detection
Intrusion Detection
batteries
integrated circuits
Industrial Control Systems
industrial control
IDS
ICs
false alarm rate
Dr. WATTson
Data Breach
Current measurement
Current Drain Intrusion Detection
computer network security
composability
CBID
behavior-based detection
biblio
A Novel Semi-Supervised Adaboost Technique for Network Anomaly Detection
Submitted by grigby1 on Tue, 05/16/2017 - 11:34am
adaboost algorithms
composability
detection rate
execution time
false alarm rate
False Data Detection
IDS
Intrusion Detection System (IDS)
Intrusion Detection Systems
network anomaly detection
pubcrawl
Resiliency
tri-training approach
biblio
Effect of data size on performance of free-text keystroke authentication
Submitted by grigby1 on Wed, 03/08/2017 - 1:47pm
imposter pass rate
testing
test sample size
standards
reference profile size
public datasets
pubcrawl170115
physiological traits
keystroke data
Keyboards
IPR
intellectual property
authentication
free-text keystroke authentication
FAR
false alarm rate
Distance measurement
Databases
data size
biometrics (access control)
bioinformatics
behavioral biometric
authorisation
authentication performance